Lifting RFID's veil of secrecy

Tanner, John C.
June 2006
America's Network;Jun2006, Vol. 110 Issue 3, p42
Trade Publication
The article discusses the RFID chips virus vulnerability. RFID tag is a computer chip connected to a network that relies on the software. This is similar to other network like the Internet-capable mobile phones. The news on RFID virus story is brought by the unawareness of its use. RFID tag is predicted to grow from 1.3 billion in 2005 to 33 billion 2010. It will be virtually everywhere and this issue is the main concern of consumer advocates and civil liberty groups. However, RFID executives have responded quickly to the issues.


Related Articles

  • YOU DIDN'T KNOW YOU COULD DO WITH RFID. Mika, Eric // Popular Science;Sep2006, Vol. 269 Issue 3, p85 

    The article lists several products that use Radio Frequency Identification tags. RFID kits from MyKey2300.com make sure users will never leave their keys again. Kits from Phidgets.com allow people to eschew computer passwords in favor of physical RFID tags. A kit from iAutomate can control...

  • Evaluation and exploration of RFID systems by rapid prototyping. Angerer, Christoph; Langwieser, Robert; Rupp, Markus // Personal & Ubiquitous Computing;Mar2012, Vol. 16 Issue 3, p309 

    Today's RFID systems exhibit relatively little functionality, while future systems and ubiquitous computing applications require an ample set of general purpose features, like wide communication ranges, high data rates, high reliability, and many more. In order to meet these high-performance...

  • Real time locating systems drive growth.  // Converter;Feb2008, Vol. 45 Issue 2, p19 

    The article discusses the growth of Active Radio Frequency Identification (RFID), which incorporates many technologies, including Real Time Locating Systems, Ubiquitous Sensor Networks and Active RFID with Zigbee. Results of a study by IDTechEx reveals that this market is growing faster than...

  • Choosing an RFID Solution. Albright, Brian // Frontline Solutions;Feb2004, Vol. 5 Issue 2, p16 

    Provides some tips to help companies select products and services to comply with radio frequency identification (RFID) mandates in the U.S. in 2004. Classification of vendors into RFID hardware providers, application software providers and consultants and integrators; How vendors can minimize...

  • More RFID Players.  // Traffic World;8/1/2005, Vol. 269 Issue 31, p14 

    Reports that more software providers are jumping into the market for radio frequency identification technology as it gains more widespread usage in the supply chain in the U.S. in 2005.

  • Mutual Authentication Protocol with Ownership Transfer. Leian Liu; Zhiqiang Chen; Juan Zou; Ling Yang; Yuli Shen // International Journal of Digital Content Technology & its Applic;Apr2012, Vol. 6 Issue 7, p58 

    In recent years, along with the extensive applications of RFID technology, RFID security and privacy issues have become the hotspot of research. During the whole life of an RFID tag, its owners may change many times. The privacy of its old owners and new owners must be protected, which is called...

  • Habitat for Humanity. S.J.H. // Science & Spirit;May/Jun2004, Vol. 15 Issue 3, p19 

    Features the Media Lab Europe's Human Connectedness group's Habitat technology, which allows a far-away partner to feel as close to home. Use of computer-networked coffee tables; Integration of a computer, Radio Frequency Identification tag reader, and video projector into each table; Image...

  • Making More Sense. Ashton, Kevin // RFID Journal;Sep/Oct2013, p1 

    The article discusses issues related to radio frequency identification (RFID) technology and the Internet of Things. It mentions the use of sensors, which provide cross-referencing, complementary information, and confirmation, as well as RFID tags, which enable computers to sense identity....

  • Number one with a (RFID) bullet.  // Wireless Asia;May2004, Vol. 7 Issue 4, p32 

    Reports on the interest of identification sniper over radio frequency identification system (RFID) chips and location-based wireless technology. Involvement of corporate conspiracies, celebrities and former Nigerian treasury agents in spam hoaxes; Implantation of a Global Positioning...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics